Tran Trung Duy | PTIT (original) (raw)

Papers by Tran Trung Duy

Research paper thumbnail of HIỆU NĂNG BẢO MẬT LỚP VẬT LÝ CỦA TRUYỀN THÔNG VÔ TUYẾN VỚI MẶT PHẢN XẠ THÔNG MINH CHO KÊNH TRUYỀN HỖN HỢP

Research paper thumbnail of ĐÁNH GIÁ HIỆU NĂNG MẠNG CHUYỂN TIẾP ĐA CHẶNG SỬ DỤNG MÃ FOUNTAIN DƯỚI SỰ TÁC ĐỘNG CỦA NHIỄU ĐỒNG KÊNH

Research paper thumbnail of PHÂN TÍCH XÁC SUẤT DỪNG CHO MẠNG CHUYỂN TIẾP ĐA CHẶNG DẠNG CỤM SỬ DỤNG KỸ THUẬT NOMA DƯỚI SỰ TÁC  ĐỘNG CỦA KHIẾM KHUYẾT PHẦN CỨNG TRÊN KÊNH NAKAGAMI-M

Journal of Science and Technology on Information and Communications, 2022

Research paper thumbnail of Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper

Electronics, 2020

In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and p... more In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel information is not available at the base stations (BSs). The purpose of artificial noise is to create downlink interference with the hidden eavesdropper as much as possible, while satisfying the quality of service for two-way communications. For perfect downlink channels, the semidefinite relaxation (SDR) technique is exploited, and the optimal matrices are proven to satisfy rank-1 conditions, thus providing the optimal beamforming vectors. For imperfect downlink channel state information, we propose an iterative algorithm with a penalty function to obtain the approximate rank-1 matrices. On uplink, we attain the optimal transmission power for user...

Research paper thumbnail of Combining Power Allocation and Superposition Coding for an Underlay Two-way Decode-and-forward Scheme

1 Original Article Combining Power Allocation and Superposition Coding for an Underlay Two-way De... more 1 Original Article Combining Power Allocation and Superposition Coding for an Underlay Two-way Decode-and-forward Scheme Pham Ngoc Son, Tran Trung Duy, Phuc Quang Truong, Son Ngoc Truong, Pham Viet Tuan, Van-Ca Phan, Khuong Ho-Van Ho Chi Minh City University of Technology and Education, Vo Van Ngan Street, Thu Duc City, Ho Chi Minh City, Vietnam Posts and Telecommunications Institute of Technology, Nguyen Dinh Chieu Street, District 1, Ho Chi Minh City, Vietnam University of Education, Hue University, Le Loi Street, Hue City, Vietnam Ho Chi Minh City University of Technology (HCMUT), Ly Thuong Kiet Street, District 10, Ho Chi Minh City, Vietnam Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam

Research paper thumbnail of Security-reliability tradeoff of MIMO TAS/SC networks using harvest-to-jam cooperative jamming methods with random jammer location

Research paper thumbnail of Multiuser MISO Beamforming Design for Balancing the Received Powers in Secure Cognitive Radio Networks

2018 IEEE Seventh International Conference on Communications and Electronics (ICCE), 2018

In this study, we consider multiuser multi-input single-output (MISO) beamforming design in under... more In this study, we consider multiuser multi-input single-output (MISO) beamforming design in underlay cognitive radio networks in the presence of a primary user (PU) and eavesdropper (Eve). We propose a multi-objective optimization problem (MOOP) for balancing two conflicting design objectives: maximizing the total intended power received at secondary receivers and minimizing the interference power at the PU, while satisfying the secrecy rate and PU interference threshold constraints. The MOOP was solved by a weighted sum method and semidefinite programming relaxation (SDR), and the rank-one optimal solutions were drawn with explanations. The upper and lower bounds were found by solving the single-objective and zero-forcing beamforming problems. The simulation results demonstrated a trade-off between the objectives in the Pareto optimal set, no improvement of performance with artificial noise, and better results with increasing number of transmission antennas.

Research paper thumbnail of Secrecy Performance Enhancement Using Path Selection over Cluster-Based Cognitive Radio Networks

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2019

In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) net... more In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) networks for secrecy enhancement by formulating the probability of non-zero secrecy capacity (PNSC). In the proposed work, it is assumed that uniform transmit power for the secondary transmitters and jammers must be adjusted to guarantee quality of service (QoS) of the primary network, follows a simple and efficient power allocation strategy. To improve the channel capacity, the best receiver is selected at each cluster to relay the source data to the next hop. Additionally, a jammer is randomly chosen at each cluster to generate noises on an eavesdropper, and to reduce the quality of the eavesdropping links. Three methods are studied in this paper. First, we propose the BEST path selection method (BEST) to maximize the end-to-end instantaneous secrecy capacity. Second, the path obtaining the MAXimum Value for the average end-to-end PNSC (MAXV) is selected for data transmission. Third, we also propose a RAND method in which a RANDom path is employed. For performance evaluation and comparison, we derive exact closed-form expressions for the end-to-end PNSC of the BEST, MAXV and RAND methods over Rayleigh fading channel. Monte Carlo simulations are then performed to verify the derived theoretical results.

Research paper thumbnail of Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments

EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2021

Research paper thumbnail of Secrecy outage performance of multi-hop LEACH networks using power beacon aided cooperative jamming with jammer selection methods

AEU - International Journal of Electronics and Communications, 2020

Research paper thumbnail of A new approach for two-way relaying networks: improving performance by successive interference cancellation, digital network coding and opportunistic relay selection

Research paper thumbnail of Performance analysis of underlay cooperative cognitive full-duplex networks with energy-harvesting relay

Computer Communications, 2018

Research paper thumbnail of Performance of cluster-based cognitive multihop networks under joint impact of hardware noises and non-identical primary co-channel interference

TELKOMNIKA (Telecommunication Computing Electronics and Control), 2019

Research paper thumbnail of Throughput Analysis of Power Beacon-Aided Multi-hop Relaying Networks Employing Non-orthogonal Multiple Access with Hardware Impairments

Lecture Notes in Electrical Engineering, 2019

In this paper, we evaluate throughput of a power beacon-aided multi-hop relaying networks employi... more In this paper, we evaluate throughput of a power beacon-aided multi-hop relaying networks employing non-orthogonal multiple access (NOMA). In the proposed protocol, the source data are sent to the destination via the multi-hop transmission model. In addition, the source and relay nodes have to harvest energy the radio frequency (RF) signals generated by a power beacon. For performance evaluation, we derive an exact closed-form expression of throughput for the proposed scheme over Rayleigh fading channel and under impact of imperfect transceiver hardware. We finally perform simulation results to verify the theoretical results.

Research paper thumbnail of Power allocation strategies for dual-hop relay protocols with best relay selection under constraint of intercept probability

Research paper thumbnail of Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods

Research paper thumbnail of End-to-end security-reliability analysis of multi-hop cognitive relaying protocol with TAS/SC-based primary communication, total interference constraint and asymmetric fading channels

International Journal of Communication Systems, 2018

Research paper thumbnail of Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels

Research paper thumbnail of Secrecy Performance of Joint Relay and Jammer Selection Methods in Cluster Networks: With and Without Hardware Noises

Lecture Notes in Electrical Engineering, 2016

In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performan... more In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performance for cluster-based multi-hop networks. In particular, without channel state information (CSI) of the eavesdropping links, one of available nodes at each cluster is selected to forward the source data, relying on the CSI of the data links, while a jammer node is randomly chosen to generate artificial noises to an eavesdropper. We also investigate the impact of hardware noises on the secrecy performance of the proposed protocols. When the transceiver hardware is perfect, we derive exact closed-form expressions of secrecy outage probability (SOP) for the proposed protocols over Rayleigh fading channel. We then perform Monte Carlo based computer simulations to verify the theoretical results.

Research paper thumbnail of Performance Evaluation of User Selection Protocols in Random Networks with Energy Harvesting and Hardware Impairments

Advances in Electrical and Electronic Engineering, 2016

In this paper, we evaluate performances of various user selection protocols under impact of hardw... more In this paper, we evaluate performances of various user selection protocols under impact of hardware impairments. In the considered protocols, a Base Station (BS) selects one of available Users (US) to serve, while the remaining USs harvest the energy from the Radio Frequency (RF) transmitted by the BS. We assume that all of the US randomly appear around the BS. In the Random Selection Protocol (RAN), the BS randomly selects a US to transmit the data. In the second proposed protocol, named Minimum Distance Protocol (MIND), the US that is nearest to the BS will be chosen. In the Optimal Selection Protocol (OPT), the US providing the highest channel gain between itself and the BS will be served. For performance evaluation, we derive exact and asymptotic closed-form expressions of average Outage Probability (OP) over Rayleigh fading channels. We also consider average harvested energy per a US. Finally, Monte-Carlo simulations are then performed to verify the theoretical results.

Research paper thumbnail of HIỆU NĂNG BẢO MẬT LỚP VẬT LÝ CỦA TRUYỀN THÔNG VÔ TUYẾN VỚI MẶT PHẢN XẠ THÔNG MINH CHO KÊNH TRUYỀN HỖN HỢP

Research paper thumbnail of ĐÁNH GIÁ HIỆU NĂNG MẠNG CHUYỂN TIẾP ĐA CHẶNG SỬ DỤNG MÃ FOUNTAIN DƯỚI SỰ TÁC ĐỘNG CỦA NHIỄU ĐỒNG KÊNH

Research paper thumbnail of PHÂN TÍCH XÁC SUẤT DỪNG CHO MẠNG CHUYỂN TIẾP ĐA CHẶNG DẠNG CỤM SỬ DỤNG KỸ THUẬT NOMA DƯỚI SỰ TÁC  ĐỘNG CỦA KHIẾM KHUYẾT PHẦN CỨNG TRÊN KÊNH NAKAGAMI-M

Journal of Science and Technology on Information and Communications, 2022

Research paper thumbnail of Optimizing a Secure Two-Way Network with Non-Linear SWIPT, Channel Uncertainty, and a Hidden Eavesdropper

Electronics, 2020

In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and p... more In this paper, the optimization of downlink beamforming vectors, uplink transmission power, and power-splitting factors is investigated for a secure two-way SWIPT network in the presence of a hidden eavesdropper and non-linear energy harvesting circuits over both perfect and imperfect channels. The eavesdropper is inactive, so its channel information is not available at the base stations (BSs). The purpose of artificial noise is to create downlink interference with the hidden eavesdropper as much as possible, while satisfying the quality of service for two-way communications. For perfect downlink channels, the semidefinite relaxation (SDR) technique is exploited, and the optimal matrices are proven to satisfy rank-1 conditions, thus providing the optimal beamforming vectors. For imperfect downlink channel state information, we propose an iterative algorithm with a penalty function to obtain the approximate rank-1 matrices. On uplink, we attain the optimal transmission power for user...

Research paper thumbnail of Combining Power Allocation and Superposition Coding for an Underlay Two-way Decode-and-forward Scheme

1 Original Article Combining Power Allocation and Superposition Coding for an Underlay Two-way De... more 1 Original Article Combining Power Allocation and Superposition Coding for an Underlay Two-way Decode-and-forward Scheme Pham Ngoc Son, Tran Trung Duy, Phuc Quang Truong, Son Ngoc Truong, Pham Viet Tuan, Van-Ca Phan, Khuong Ho-Van Ho Chi Minh City University of Technology and Education, Vo Van Ngan Street, Thu Duc City, Ho Chi Minh City, Vietnam Posts and Telecommunications Institute of Technology, Nguyen Dinh Chieu Street, District 1, Ho Chi Minh City, Vietnam University of Education, Hue University, Le Loi Street, Hue City, Vietnam Ho Chi Minh City University of Technology (HCMUT), Ly Thuong Kiet Street, District 10, Ho Chi Minh City, Vietnam Vietnam National University Ho Chi Minh City, Ho Chi Minh City, Vietnam

Research paper thumbnail of Security-reliability tradeoff of MIMO TAS/SC networks using harvest-to-jam cooperative jamming methods with random jammer location

Research paper thumbnail of Multiuser MISO Beamforming Design for Balancing the Received Powers in Secure Cognitive Radio Networks

2018 IEEE Seventh International Conference on Communications and Electronics (ICCE), 2018

In this study, we consider multiuser multi-input single-output (MISO) beamforming design in under... more In this study, we consider multiuser multi-input single-output (MISO) beamforming design in underlay cognitive radio networks in the presence of a primary user (PU) and eavesdropper (Eve). We propose a multi-objective optimization problem (MOOP) for balancing two conflicting design objectives: maximizing the total intended power received at secondary receivers and minimizing the interference power at the PU, while satisfying the secrecy rate and PU interference threshold constraints. The MOOP was solved by a weighted sum method and semidefinite programming relaxation (SDR), and the rank-one optimal solutions were drawn with explanations. The upper and lower bounds were found by solving the single-objective and zero-forcing beamforming problems. The simulation results demonstrated a trade-off between the objectives in the Pareto optimal set, no improvement of performance with artificial noise, and better results with increasing number of transmission antennas.

Research paper thumbnail of Secrecy Performance Enhancement Using Path Selection over Cluster-Based Cognitive Radio Networks

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2019

In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) net... more In this paper, we propose three path selection methods for cluster-based cognitive radio (CR) networks for secrecy enhancement by formulating the probability of non-zero secrecy capacity (PNSC). In the proposed work, it is assumed that uniform transmit power for the secondary transmitters and jammers must be adjusted to guarantee quality of service (QoS) of the primary network, follows a simple and efficient power allocation strategy. To improve the channel capacity, the best receiver is selected at each cluster to relay the source data to the next hop. Additionally, a jammer is randomly chosen at each cluster to generate noises on an eavesdropper, and to reduce the quality of the eavesdropping links. Three methods are studied in this paper. First, we propose the BEST path selection method (BEST) to maximize the end-to-end instantaneous secrecy capacity. Second, the path obtaining the MAXimum Value for the average end-to-end PNSC (MAXV) is selected for data transmission. Third, we also propose a RAND method in which a RANDom path is employed. For performance evaluation and comparison, we derive exact closed-form expressions for the end-to-end PNSC of the BEST, MAXV and RAND methods over Rayleigh fading channel. Monte Carlo simulations are then performed to verify the derived theoretical results.

Research paper thumbnail of Reliability-Security Analysis for Harvest-to-Jam based Multi-hop Cluster MIMO Networks Using Cooperative Jamming Methods Under Impact of Hardware Impairments

EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2021

Research paper thumbnail of Secrecy outage performance of multi-hop LEACH networks using power beacon aided cooperative jamming with jammer selection methods

AEU - International Journal of Electronics and Communications, 2020

Research paper thumbnail of A new approach for two-way relaying networks: improving performance by successive interference cancellation, digital network coding and opportunistic relay selection

Research paper thumbnail of Performance analysis of underlay cooperative cognitive full-duplex networks with energy-harvesting relay

Computer Communications, 2018

Research paper thumbnail of Performance of cluster-based cognitive multihop networks under joint impact of hardware noises and non-identical primary co-channel interference

TELKOMNIKA (Telecommunication Computing Electronics and Control), 2019

Research paper thumbnail of Throughput Analysis of Power Beacon-Aided Multi-hop Relaying Networks Employing Non-orthogonal Multiple Access with Hardware Impairments

Lecture Notes in Electrical Engineering, 2019

In this paper, we evaluate throughput of a power beacon-aided multi-hop relaying networks employi... more In this paper, we evaluate throughput of a power beacon-aided multi-hop relaying networks employing non-orthogonal multiple access (NOMA). In the proposed protocol, the source data are sent to the destination via the multi-hop transmission model. In addition, the source and relay nodes have to harvest energy the radio frequency (RF) signals generated by a power beacon. For performance evaluation, we derive an exact closed-form expression of throughput for the proposed scheme over Rayleigh fading channel and under impact of imperfect transceiver hardware. We finally perform simulation results to verify the theoretical results.

Research paper thumbnail of Power allocation strategies for dual-hop relay protocols with best relay selection under constraint of intercept probability

Research paper thumbnail of Performance enhancement for energy harvesting based two-way relay protocols in wireless ad-hoc networks with partial and full relay selection methods

Research paper thumbnail of End-to-end security-reliability analysis of multi-hop cognitive relaying protocol with TAS/SC-based primary communication, total interference constraint and asymmetric fading channels

International Journal of Communication Systems, 2018

Research paper thumbnail of Analysis of Probability of Non-zero Secrecy Capacity for Multi-hop Networks in Presence of Hardware Impairments over Nakagami-m Fading Channels

Research paper thumbnail of Secrecy Performance of Joint Relay and Jammer Selection Methods in Cluster Networks: With and Without Hardware Noises

Lecture Notes in Electrical Engineering, 2016

In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performan... more In this paper, we propose joint relay and jammer selection protocols to enhance secrecy performance for cluster-based multi-hop networks. In particular, without channel state information (CSI) of the eavesdropping links, one of available nodes at each cluster is selected to forward the source data, relying on the CSI of the data links, while a jammer node is randomly chosen to generate artificial noises to an eavesdropper. We also investigate the impact of hardware noises on the secrecy performance of the proposed protocols. When the transceiver hardware is perfect, we derive exact closed-form expressions of secrecy outage probability (SOP) for the proposed protocols over Rayleigh fading channel. We then perform Monte Carlo based computer simulations to verify the theoretical results.

Research paper thumbnail of Performance Evaluation of User Selection Protocols in Random Networks with Energy Harvesting and Hardware Impairments

Advances in Electrical and Electronic Engineering, 2016

In this paper, we evaluate performances of various user selection protocols under impact of hardw... more In this paper, we evaluate performances of various user selection protocols under impact of hardware impairments. In the considered protocols, a Base Station (BS) selects one of available Users (US) to serve, while the remaining USs harvest the energy from the Radio Frequency (RF) transmitted by the BS. We assume that all of the US randomly appear around the BS. In the Random Selection Protocol (RAN), the BS randomly selects a US to transmit the data. In the second proposed protocol, named Minimum Distance Protocol (MIND), the US that is nearest to the BS will be chosen. In the Optimal Selection Protocol (OPT), the US providing the highest channel gain between itself and the BS will be served. For performance evaluation, we derive exact and asymptotic closed-form expressions of average Outage Probability (OP) over Rayleigh fading channels. We also consider average harvested energy per a US. Finally, Monte-Carlo simulations are then performed to verify the theoretical results.

Research paper thumbnail of Outage Performance of Cognitive Cooperative Networks with Relay Selection over Double-Rayleigh Fading Channels

IET Communications, 2016

This paper considers a dual-hop cognitive inter-vehicular relay-assisted communication system whe... more This paper considers a dual-hop cognitive inter-vehicular relay-assisted communication system where all communication links are non-line of sight ones and their fading is modeled by the double Rayleigh fading distribution. Roadside relays (or access points) implementing the decode-and-forward (DF) relaying protocol are employed and one of them is selected according to a predetermined policy in order to enable communication between vehicles. The performance of the considered cognitive cooperative system is investigated for Kth best partial and full relay selection (RS) as well as for two distinct fading scenarios. In the first scenario, all channels are double Rayleigh distributed. In the second scenario, only the secondary source to relay and relay to destination channels are considered to be subject to double Rayleigh fading whereas, channels between the secondary transmitters and the primary user are modeled by the Rayleigh distribution. Exact and approximate expressions for the outage probability performance for all considered RS policies and fading scenarios are presented. In addition to the analytical results, complementary computer simulated performance evaluation results have been obtained by means of Monte Carlo simulations. The perfect match between these two sets of results has verified the accuracy of the proposed mathematical analysis.